SUSE-SU-2024:3559-1: important: Security update for the Linux Kernel
SLE-UPDATES
null at suse.de
Wed Oct 9 12:34:19 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3559-1
Release Date: 2024-10-09T08:19:22Z
Rating: important
References:
* bsc#1054914
* bsc#1065729
* bsc#1207341
* bsc#1225316
* bsc#1226846
* bsc#1226860
* bsc#1226878
* bsc#1227487
* bsc#1227941
* bsc#1227952
* bsc#1227953
* bsc#1228000
* bsc#1228002
* bsc#1228068
* bsc#1228507
* bsc#1228615
* bsc#1228620
* bsc#1228635
* bsc#1229334
* bsc#1229362
* bsc#1229363
* bsc#1229456
* bsc#1229457
* bsc#1229633
* bsc#1229645
* bsc#1229739
* bsc#1229753
* bsc#1229764
* bsc#1229790
* bsc#1229830
* bsc#1230015
* bsc#1230151
* bsc#1230171
* bsc#1230174
* bsc#1230176
* bsc#1230178
* bsc#1230180
* bsc#1230185
* bsc#1230200
* bsc#1230204
* bsc#1230233
* bsc#1230248
* bsc#1230270
* bsc#1230398
* bsc#1230506
* bsc#1230515
* bsc#1230517
* bsc#1230533
* bsc#1230535
* bsc#1230549
* bsc#1230556
* bsc#1230582
* bsc#1230589
* bsc#1230700
* bsc#1230702
* bsc#1230709
* bsc#1230710
* bsc#1230712
* bsc#1230730
* bsc#1230731
* bsc#1230732
* bsc#1230747
* bsc#1230748
* bsc#1230756
* bsc#1230761
* bsc#1230763
* bsc#1230767
* bsc#1230771
* bsc#1230783
* bsc#1230796
* bsc#1230810
* bsc#1230814
* bsc#1230815
* bsc#1230826
* bsc#1231083
* bsc#1231084
* bsc#1231089
* bsc#1231120
* bsc#1231146
* bsc#1231184
Cross-References:
* CVE-2021-47387
* CVE-2022-48788
* CVE-2022-48789
* CVE-2022-48790
* CVE-2022-48791
* CVE-2022-48799
* CVE-2022-48844
* CVE-2022-48911
* CVE-2022-48943
* CVE-2022-48945
* CVE-2023-52915
* CVE-2024-38381
* CVE-2024-38596
* CVE-2024-38632
* CVE-2024-41073
* CVE-2024-41079
* CVE-2024-41082
* CVE-2024-42154
* CVE-2024-42265
* CVE-2024-42305
* CVE-2024-42306
* CVE-2024-43884
* CVE-2024-43890
* CVE-2024-43898
* CVE-2024-43912
* CVE-2024-43914
* CVE-2024-44946
* CVE-2024-44947
* CVE-2024-44948
* CVE-2024-44950
* CVE-2024-44952
* CVE-2024-44954
* CVE-2024-44969
* CVE-2024-44982
* CVE-2024-44987
* CVE-2024-44998
* CVE-2024-44999
* CVE-2024-45008
* CVE-2024-46673
* CVE-2024-46675
* CVE-2024-46676
* CVE-2024-46677
* CVE-2024-46679
* CVE-2024-46685
* CVE-2024-46686
* CVE-2024-46702
* CVE-2024-46707
* CVE-2024-46715
* CVE-2024-46721
* CVE-2024-46722
* CVE-2024-46723
* CVE-2024-46731
* CVE-2024-46737
* CVE-2024-46738
* CVE-2024-46739
* CVE-2024-46743
* CVE-2024-46744
* CVE-2024-46745
* CVE-2024-46750
* CVE-2024-46753
* CVE-2024-46759
* CVE-2024-46761
* CVE-2024-46770
* CVE-2024-46774
* CVE-2024-46783
* CVE-2024-46784
* CVE-2024-46787
* CVE-2024-46822
* CVE-2024-46853
* CVE-2024-46854
* CVE-2024-46859
CVSS scores:
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43890 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43912 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46675 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L
* CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46676 ( SUSE ): 2.4
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46702 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46737 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46738 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46739 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46743 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46744 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46753 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46759 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46761 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46783 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46787 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise High Availability Extension 12 SP5
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Software Development Kit 12 SP5
* SUSE Linux Enterprise Workstation Extension 12 12-SP5
An update that solves 71 vulnerabilities and has nine security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2021-47387: cpufreq: schedutil: Destroy mutex before kobject_put() frees
the memory (bsc#1225316).
* CVE-2022-48788: nvme-rdma: fix possible use-after-free in transport
error_recovery work (bsc#1227952).
* CVE-2022-48789: nvme-tcp: fix possible use-after-free in transport
error_recovery work (bsc#1228000).
* CVE-2022-48790: nvme: fix a possible use-after-free in controller reset
during load (bsc#1227941).
* CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)
* CVE-2022-48799: perf: Fix list corruption in perf_cgroup_switch()
(bsc#1227953).
* CVE-2022-48844: Bluetooth: hci_core: Fix leaking sent_cmd skb (bsc#1228068).
* CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.
(bsc#1229633).
* CVE-2022-48943: KVM: x86/mmu: make apf token non-zero to fix bug
(bsc#1229645).
* CVE-2022-48945: media: vivid: fix compose size exceed boundary
(bsc#1230398).
* CVE-2023-52915: media: dvb-usb-v2: af9035: fix missing unlock (bsc#1230270).
* CVE-2024-38596: af_unix: Fix data races in
unix_release_sock/unix_stream_sendmsg (bsc#1226846).
* CVE-2024-41073: nvme: avoid double free special payload (bsc#1228635).
* CVE-2024-41079: nvmet: always initialize cqe.result (bsc#1228615).
* CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
(bsc#1228620 CVE-2024-41082).
* CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
* CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from
mispredictions (bsc#1229334).
* CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir
indexed (bsc#1229363).
* CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer
(bsc#1229362).
* CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
* CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
* CVE-2024-43898: ext4: sanity check for NULL pointer after
ext4_force_shutdown (bsc#1229753).
* CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths
(bsc#1229830)
* CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after
reassembling (bsc#1229790).
* CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket
(bsc#1230015).
* CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them
(bsc#1230174).
* CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special
register set (bsc#1230180).
* CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race
(bsc#1230178).
* CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176).
* CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O (bsc#1230200).
* CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
(bsc#1230204).
* CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
* CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx()
(bsc#1230171).
* CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
* CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).
* CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure
(bsc#1230506).
* CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer
address access (bsc#1230533).
* CVE-2024-46676: nfc: pn533: Add poll mod list filling check (bsc#1230535).
* CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
* CVE-2024-46679: ethtool: check device is present when getting link settings
(bsc#1230556).
* CVE-2024-46685: pinctrl: single: fix potential NULL dereference in
pcs_get_function() (bsc#1230515)
* CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in
smb2_new_read_req() (bsc#1230517).
* CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is
removed (bsc#1230589)
* CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a
vGICv3 (bsc#1230582).
* CVE-2024-46715: driver: iio: add missing checks on iio_info's callback
access (bsc#1230700).
* CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
* CVE-2024-46722: drm/amdgpu: fix mc_data out-of-bounds read warning
(bsc#1230712).
* CVE-2024-46723: drm/amdgpu: fix ucode out-of-bounds read warning
(bsc#1230702).
* CVE-2024-46731: drm/amd/pm: fix the Out-of-bounds read warning
(bsc#1230709).
* CVE-2024-46738: VMCI: Fix use-after-free when removing resource in
vmci_resource_remove() (bsc#1230731).
* CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in
interrupt map walk (bsc#1230756).
* CVE-2024-46744: Squashfs: sanity check symbolic link size (bsc#1230747).
* CVE-2024-46745: Input: uinput - reject requests with unreasonable number of
slots (bsc#1230748).
* CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock()
(bsc#1230783).
* CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly
(bsc#1230796).
* CVE-2024-46759: hwmon: (adc128d818) Fix underflows seen when writing limit
attributes (bsc#1230814).
* CVE-2024-46761: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
(bsc#1230761).
* CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
(bsc#1230763).
* CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg()
(bsc#1230810).
* CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
* CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing
CPU entry (bsc#1231120).
* CVE-2024-46853: spi: nxp-fspi: fix the KASAN report out-of-bounds bug
(bsc#1231083).
* CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
* CVE-2024-46859: platform/x86: panasonic-laptop: Fix SINF array out of bounds
accesses (bsc#1231089).
The following non-security bugs were fixed:
* ACPI / EC: Clean up EC GPE mask flag (git-fixes).
* ACPI: EC: Avoid printing confusing messages in acpi_ec_setup() (git-fixes).
* ACPI: EC: Fix an EC event IRQ storming issue (git-fixes).
* ACPI: EC: tweak naming in preparation for GpioInt support (git-fixes).
* ACPI: SPCR: Consider baud rate 0 as preconfigured state (git-fixes).
* ACPI: SPCR: Workaround for APM X-Gene 8250 UART 32-alignment errata (git-
fixes).
* ACPI: SPCR: work around clock issue on xgene UART (git-fixes).
* ACPI: blacklist: fix clang warning for unused DMI table (git-fixes).
* ACPI: video: Add new hw_changes_brightness quirk, set it on PB Easynote MZ35
(git-fixes).
* Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
* Fix bsc#1054914 reference.
* PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
* RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
* RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
* RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-
fixes)
* Revert "ACPI / EC: Remove old CLEAR_ON_RESUME quirk" (git-fixes).
* af_unix: Fix data races around sk->sk_shutdown (bsc#1226846).
* af_unix: Fix data-races around sk->sk_shutdown (git-fixes).
* af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846).
* autofs4: use wait_event_killable (bsc#1207341).
* ceph: remove the incorrect Fw reference check when dirtying pages
(bsc#1231184).
* fuse: use unsigned type for getxattr/listxattr size truncation
(bsc#1230151).
* kabi fix for proc/mounts: add cursor (bsc#1207341).
* kabi/severities: Ignore ppc instruction emulation (bsc#1230826 ltc#205848)
These are lowlevel functions not used outside of exception handling and
kernel debugging facilities.
* kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
* media: vivid: avoid integer overflow (git-fixes).
* media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes).
* media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes).
* media: vivid: s_fbuf: add more sanity checks (git-fixes).
* net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-
fixes).
* net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
fixes).
* net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-
fixes).
* nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
* nvmet: Identify-Active Namespace ID List command should reject invalid nsid
(git-fixes).
* ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
* ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
* ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
* powerpc sstep: Add support for cnttzw, cnttzd instructions (bsc#1230826
ltc#205848).
* powerpc sstep: Add support for extswsli instruction (bsc#1230826
ltc#205848).
* powerpc sstep: Add support for modsd, modud instructions (bsc#1230826
ltc#205848).
* powerpc sstep: Add support for modsw, moduw instructions (bsc#1230826
ltc#205848).
* powerpc/32: Move the inline keyword at the beginning of function declaration
(bsc#1230826 ltc#205848).
* powerpc/64: Fix update forms of loads and stores to write 64-bit EA
(bsc#1230826 ltc#205848).
* powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1230826 ltc#205848).
* powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-
fixes).
* powerpc/imc-pmu: Revert nest_init_lock to being a mutex (bsc#1065729).
* powerpc/iommu: Annotate nested lock for lockdep (bsc#1065729).
* powerpc/kprobes: Blacklist emulate_update_regs() from kprobes (bsc#1230826
ltc#205848).
* powerpc/kprobes: Update optprobes to use emulate_update_regs() (bsc#1230826
ltc#205848).
* powerpc/lib/sstep: Add XER bits introduced in POWER ISA v3.0 (bsc#1230826
ltc#205848).
* powerpc/lib/sstep: Add bpermd instruction emulation (bsc#1230826
ltc#205848).
* powerpc/lib/sstep: Add cmpb instruction emulation (bsc#1230826 ltc#205848).
* powerpc/lib/sstep: Add isel instruction emulation (bsc#1230826 ltc#205848).
* powerpc/lib/sstep: Add popcnt instruction emulation (bsc#1230826
ltc#205848).
* powerpc/lib/sstep: Add prty instruction emulation (bsc#1230826 ltc#205848).
* powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1230826 ltc#205848).
* powerpc/lib/sstep: Fix count leading zeros instructions (bsc#1230826
ltc#205848).
* powerpc/lib/sstep: Fix fixed-point arithmetic instructions that set CA32
(bsc#1230826 ltc#205848).
* powerpc/lib/sstep: Fix fixed-point shift instructions that set CA32
(bsc#1230826 ltc#205848).
* powerpc/lib/sstep: fix 'ptesync' build error (bsc#1230826 ltc#205848).
* powerpc/lib: Fix "integer constant is too large" build failure (bsc#1230826
ltc#205848).
* powerpc/lib: fix redundant inclusion of quad.o (bsc#1230826 ltc#205848).
* powerpc/ppc-opcode: Add divde and divdeu opcodes (bsc#1230826 ltc#205848).
* powerpc/pseries: fix possible memory leak in ibmebus_bus_init()
(bsc#1065729).
* powerpc/sstep: Add support for divde[.] and divdeu[.] instructions
(bsc#1230826 ltc#205848).
* powerpc/sstep: Avoid used uninitialized error (bsc#1230826 ltc#205848).
* powerpc/sstep: Check instruction validity against ISA version before
emulation (bsc#1230826 ltc#205848).
* powerpc/sstep: Fix darn emulation (bsc#1230826 ltc#205848).
* powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1230826
ltc#205848).
* powerpc/sstep: Fix issues with mcrf (bsc#1230826 ltc#205848).
* powerpc/sstep: Fix issues with set_cr0() (bsc#1230826 ltc#205848).
* powerpc/sstep: Fix kernel crash if VSX is not present (bsc#1230826
ltc#205848).
* powerpc/sstep: Introduce GETTYPE macro (bsc#1230826 ltc#205848).
* powerpc/sstep: mullw should calculate a 64 bit signed result (bsc#1230826
ltc#205848).
* powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
* powerpc: Add emulation for the addpcis instruction (bsc#1230826 ltc#205848).
* powerpc: Change analyse_instr so it does not modify *regs (bsc#1230826
ltc#205848).
* powerpc: Do not check MSR FP/VMX/VSX enable bits in analyse_instr()
(bsc#1230826 ltc#205848).
* powerpc: Do not update CR0 in emulation of popcnt, prty, bpermd instructions
(bsc#1230826 ltc#205848).
* powerpc: Emulate FP/vector/VSX loads/stores correctly when regs not live
(bsc#1230826 ltc#205848).
* powerpc: Emulate load/store floating double pair instructions (bsc#1230826
ltc#205848).
* powerpc: Emulate load/store floating point as integer word instructions
(bsc#1230826 ltc#205848).
* powerpc: Emulate the dcbz instruction (bsc#1230826 ltc#205848).
* powerpc: Emulate vector element load/store instructions (bsc#1230826
ltc#205848).
* powerpc: Fix emulation of the isel instruction (bsc#1230826 ltc#205848).
* powerpc: Fix handling of alignment interrupt on dcbz instruction
(bsc#1230826 ltc#205848).
* powerpc: Fix kernel crash in emulation of vector loads and stores
(bsc#1230826 ltc#205848).
* powerpc: Handle most loads and stores in instruction emulation code
(bsc#1230826 ltc#205848).
* powerpc: Handle opposite-endian processes in emulation code (bsc#1230826
ltc#205848).
* powerpc: Make load/store emulation use larger memory accesses (bsc#1230826
ltc#205848).
* powerpc: Remove support for PowerPC 601 (Remove unused and malformed
assembly causing build error).
* powerpc: Separate out load/store emulation into its own function
(bsc#1230826 ltc#205848).
* powerpc: Set regs->dar if memory access fails in emulate_step() (bsc#1230826
ltc#205848).
* powerpc: Use instruction emulation infrastructure to handle alignment faults
(bsc#1230826 ltc#205848).
* powerpc: Wrap register number correctly for string load/store instructions
(bsc#1230826 ltc#205848).
* powerpc: sstep: Add support for darn instruction (bsc#1230826 ltc#205848).
* powerpc: sstep: Add support for maddhd, maddhdu, maddld instructions
(bsc#1230826 ltc#205848).
* proc/mounts: add cursor (bsc#1207341).
* profiling: fix shift too large makes kernel panic (git-fixes).
* tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
* uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-
fixes).
* usbnet: fix cyclical race on disconnect with work queue (git-fixes).
* usbnet: modern method to get random MAC (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3559=1
* SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3559=1
* SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3559=1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3559=1 SUSE-SLE-
HA-12-SP5-2024-3559=1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5
zypper in -t patch SUSE-SLE-WE-12-SP5-2024-3559=1
* SUSE Linux Enterprise High Availability Extension 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-3559=1
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3559=1
## Package List:
* SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc)
* kernel-docs-4.12.14-122.231.1
* SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x
x86_64)
* kernel-obs-build-debugsource-4.12.14-122.231.1
* kernel-obs-build-4.12.14-122.231.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc
x86_64)
* kernel-default-4.12.14-122.231.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
* kernel-default-debuginfo-4.12.14-122.231.1
* kernel-default-base-4.12.14-122.231.1
* kernel-default-debugsource-4.12.14-122.231.1
* kernel-default-base-debuginfo-4.12.14-122.231.1
* kernel-default-devel-4.12.14-122.231.1
* kernel-syms-4.12.14-122.231.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
* kernel-source-4.12.14-122.231.1
* kernel-devel-4.12.14-122.231.1
* kernel-macros-4.12.14-122.231.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.231.1
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-4.12.14-122.231.1
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-4.12.14-122.231.1
* kernel-default-base-4.12.14-122.231.1
* kernel-default-debugsource-4.12.14-122.231.1
* kernel-default-base-debuginfo-4.12.14-122.231.1
* kernel-default-devel-4.12.14-122.231.1
* kernel-syms-4.12.14-122.231.1
* SUSE Linux Enterprise Server 12 SP5 (noarch)
* kernel-source-4.12.14-122.231.1
* kernel-devel-4.12.14-122.231.1
* kernel-macros-4.12.14-122.231.1
* SUSE Linux Enterprise Server 12 SP5 (s390x)
* kernel-default-man-4.12.14-122.231.1
* SUSE Linux Enterprise Server 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.231.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le
x86_64)
* kernel-default-4.12.14-122.231.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* kernel-default-debuginfo-4.12.14-122.231.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.231.1
* kernel-default-base-4.12.14-122.231.1
* gfs2-kmp-default-4.12.14-122.231.1
* dlm-kmp-default-debuginfo-4.12.14-122.231.1
* kernel-default-debugsource-4.12.14-122.231.1
* gfs2-kmp-default-debuginfo-4.12.14-122.231.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.231.1
* ocfs2-kmp-default-4.12.14-122.231.1
* kernel-default-base-debuginfo-4.12.14-122.231.1
* cluster-md-kmp-default-4.12.14-122.231.1
* kernel-default-devel-4.12.14-122.231.1
* dlm-kmp-default-4.12.14-122.231.1
* kernel-syms-4.12.14-122.231.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
* kernel-source-4.12.14-122.231.1
* kernel-devel-4.12.14-122.231.1
* kernel-macros-4.12.14-122.231.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.231.1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc)
* kernel-default-4.12.14-122.231.1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64)
* kernel-default-debuginfo-4.12.14-122.231.1
* kernel-default-extra-4.12.14-122.231.1
* kernel-default-extra-debuginfo-4.12.14-122.231.1
* kernel-default-debugsource-4.12.14-122.231.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
x86_64)
* kernel-default-debuginfo-4.12.14-122.231.1
* gfs2-kmp-default-4.12.14-122.231.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.231.1
* dlm-kmp-default-debuginfo-4.12.14-122.231.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.231.1
* ocfs2-kmp-default-4.12.14-122.231.1
* cluster-md-kmp-default-4.12.14-122.231.1
* kernel-default-debugsource-4.12.14-122.231.1
* dlm-kmp-default-4.12.14-122.231.1
* gfs2-kmp-default-debuginfo-4.12.14-122.231.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
* kernel-default-4.12.14-122.231.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.231.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-debuginfo-4.12.14-122.231.1
* kernel-default-debugsource-4.12.14-122.231.1
* kernel-default-kgraft-devel-4.12.14-122.231.1
* kgraft-patch-4_12_14-122_231-default-1-8.3.1
* kernel-default-kgraft-4.12.14-122.231.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2022-48788.html
* https://www.suse.com/security/cve/CVE-2022-48789.html
* https://www.suse.com/security/cve/CVE-2022-48790.html
* https://www.suse.com/security/cve/CVE-2022-48791.html
* https://www.suse.com/security/cve/CVE-2022-48799.html
* https://www.suse.com/security/cve/CVE-2022-48844.html
* https://www.suse.com/security/cve/CVE-2022-48911.html
* https://www.suse.com/security/cve/CVE-2022-48943.html
* https://www.suse.com/security/cve/CVE-2022-48945.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2024-38381.html
* https://www.suse.com/security/cve/CVE-2024-38596.html
* https://www.suse.com/security/cve/CVE-2024-38632.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41082.html
* https://www.suse.com/security/cve/CVE-2024-42154.html
* https://www.suse.com/security/cve/CVE-2024-42265.html
* https://www.suse.com/security/cve/CVE-2024-42305.html
* https://www.suse.com/security/cve/CVE-2024-42306.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43890.html
* https://www.suse.com/security/cve/CVE-2024-43898.html
* https://www.suse.com/security/cve/CVE-2024-43912.html
* https://www.suse.com/security/cve/CVE-2024-43914.html
* https://www.suse.com/security/cve/CVE-2024-44946.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://www.suse.com/security/cve/CVE-2024-44948.html
* https://www.suse.com/security/cve/CVE-2024-44950.html
* https://www.suse.com/security/cve/CVE-2024-44952.html
* https://www.suse.com/security/cve/CVE-2024-44954.html
* https://www.suse.com/security/cve/CVE-2024-44969.html
* https://www.suse.com/security/cve/CVE-2024-44982.html
* https://www.suse.com/security/cve/CVE-2024-44987.html
* https://www.suse.com/security/cve/CVE-2024-44998.html
* https://www.suse.com/security/cve/CVE-2024-44999.html
* https://www.suse.com/security/cve/CVE-2024-45008.html
* https://www.suse.com/security/cve/CVE-2024-46673.html
* https://www.suse.com/security/cve/CVE-2024-46675.html
* https://www.suse.com/security/cve/CVE-2024-46676.html
* https://www.suse.com/security/cve/CVE-2024-46677.html
* https://www.suse.com/security/cve/CVE-2024-46679.html
* https://www.suse.com/security/cve/CVE-2024-46685.html
* https://www.suse.com/security/cve/CVE-2024-46686.html
* https://www.suse.com/security/cve/CVE-2024-46702.html
* https://www.suse.com/security/cve/CVE-2024-46707.html
* https://www.suse.com/security/cve/CVE-2024-46715.html
* https://www.suse.com/security/cve/CVE-2024-46721.html
* https://www.suse.com/security/cve/CVE-2024-46722.html
* https://www.suse.com/security/cve/CVE-2024-46723.html
* https://www.suse.com/security/cve/CVE-2024-46731.html
* https://www.suse.com/security/cve/CVE-2024-46737.html
* https://www.suse.com/security/cve/CVE-2024-46738.html
* https://www.suse.com/security/cve/CVE-2024-46739.html
* https://www.suse.com/security/cve/CVE-2024-46743.html
* https://www.suse.com/security/cve/CVE-2024-46744.html
* https://www.suse.com/security/cve/CVE-2024-46745.html
* https://www.suse.com/security/cve/CVE-2024-46750.html
* https://www.suse.com/security/cve/CVE-2024-46753.html
* https://www.suse.com/security/cve/CVE-2024-46759.html
* https://www.suse.com/security/cve/CVE-2024-46761.html
* https://www.suse.com/security/cve/CVE-2024-46770.html
* https://www.suse.com/security/cve/CVE-2024-46774.html
* https://www.suse.com/security/cve/CVE-2024-46783.html
* https://www.suse.com/security/cve/CVE-2024-46784.html
* https://www.suse.com/security/cve/CVE-2024-46787.html
* https://www.suse.com/security/cve/CVE-2024-46822.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46854.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://bugzilla.suse.com/show_bug.cgi?id=1054914
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1207341
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1226860
* https://bugzilla.suse.com/show_bug.cgi?id=1226878
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227941
* https://bugzilla.suse.com/show_bug.cgi?id=1227952
* https://bugzilla.suse.com/show_bug.cgi?id=1227953
* https://bugzilla.suse.com/show_bug.cgi?id=1228000
* https://bugzilla.suse.com/show_bug.cgi?id=1228002
* https://bugzilla.suse.com/show_bug.cgi?id=1228068
* https://bugzilla.suse.com/show_bug.cgi?id=1228507
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228620
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1229334
* https://bugzilla.suse.com/show_bug.cgi?id=1229362
* https://bugzilla.suse.com/show_bug.cgi?id=1229363
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229457
* https://bugzilla.suse.com/show_bug.cgi?id=1229633
* https://bugzilla.suse.com/show_bug.cgi?id=1229645
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229753
* https://bugzilla.suse.com/show_bug.cgi?id=1229764
* https://bugzilla.suse.com/show_bug.cgi?id=1229790
* https://bugzilla.suse.com/show_bug.cgi?id=1229830
* https://bugzilla.suse.com/show_bug.cgi?id=1230015
* https://bugzilla.suse.com/show_bug.cgi?id=1230151
* https://bugzilla.suse.com/show_bug.cgi?id=1230171
* https://bugzilla.suse.com/show_bug.cgi?id=1230174
* https://bugzilla.suse.com/show_bug.cgi?id=1230176
* https://bugzilla.suse.com/show_bug.cgi?id=1230178
* https://bugzilla.suse.com/show_bug.cgi?id=1230180
* https://bugzilla.suse.com/show_bug.cgi?id=1230185
* https://bugzilla.suse.com/show_bug.cgi?id=1230200
* https://bugzilla.suse.com/show_bug.cgi?id=1230204
* https://bugzilla.suse.com/show_bug.cgi?id=1230233
* https://bugzilla.suse.com/show_bug.cgi?id=1230248
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230398
* https://bugzilla.suse.com/show_bug.cgi?id=1230506
* https://bugzilla.suse.com/show_bug.cgi?id=1230515
* https://bugzilla.suse.com/show_bug.cgi?id=1230517
* https://bugzilla.suse.com/show_bug.cgi?id=1230533
* https://bugzilla.suse.com/show_bug.cgi?id=1230535
* https://bugzilla.suse.com/show_bug.cgi?id=1230549
* https://bugzilla.suse.com/show_bug.cgi?id=1230556
* https://bugzilla.suse.com/show_bug.cgi?id=1230582
* https://bugzilla.suse.com/show_bug.cgi?id=1230589
* https://bugzilla.suse.com/show_bug.cgi?id=1230700
* https://bugzilla.suse.com/show_bug.cgi?id=1230702
* https://bugzilla.suse.com/show_bug.cgi?id=1230709
* https://bugzilla.suse.com/show_bug.cgi?id=1230710
* https://bugzilla.suse.com/show_bug.cgi?id=1230712
* https://bugzilla.suse.com/show_bug.cgi?id=1230730
* https://bugzilla.suse.com/show_bug.cgi?id=1230731
* https://bugzilla.suse.com/show_bug.cgi?id=1230732
* https://bugzilla.suse.com/show_bug.cgi?id=1230747
* https://bugzilla.suse.com/show_bug.cgi?id=1230748
* https://bugzilla.suse.com/show_bug.cgi?id=1230756
* https://bugzilla.suse.com/show_bug.cgi?id=1230761
* https://bugzilla.suse.com/show_bug.cgi?id=1230763
* https://bugzilla.suse.com/show_bug.cgi?id=1230767
* https://bugzilla.suse.com/show_bug.cgi?id=1230771
* https://bugzilla.suse.com/show_bug.cgi?id=1230783
* https://bugzilla.suse.com/show_bug.cgi?id=1230796
* https://bugzilla.suse.com/show_bug.cgi?id=1230810
* https://bugzilla.suse.com/show_bug.cgi?id=1230814
* https://bugzilla.suse.com/show_bug.cgi?id=1230815
* https://bugzilla.suse.com/show_bug.cgi?id=1230826
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231084
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231120
* https://bugzilla.suse.com/show_bug.cgi?id=1231146
* https://bugzilla.suse.com/show_bug.cgi?id=1231184
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20241009/2591821b/attachment-0001.htm>
More information about the sle-updates
mailing list